Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Security Issues and Challenges in Wireless Sensor Networks

A. P. Thangamuthu, G. Vadivel, A. Priyadharshini

Abstract


The Wireless Sensor Network is defined as a network of devices that can be accessed from the tracked field through wireless connections. Data is transmitted through multiple terminals, and data is connected to other networks such as wireless Ethernet, with a gateway. Today's wireless communications technology is an important tool in any use that requires communication between one or several senders and recipients. Security is important when delivering information on the network, security is considered to be the most challenging task in WSN as its tough to keep a watch on the sensor nodes/network every time. But it must be secured to prevent an intruder from attacking the transmission of data.


Keywords


Wireless, Sensor, Devices, Communication, Links, Nodes, Gateway, Ethernet, Sender, Receiver

Full Text:

PDF

References


Vikash Kumar, Anshu Jain and P N Barwal, “wireless sensor networks: security issues, challenges and solutions”, IJICT, Vol. 4, 2014.

Yogesh Kumar, Rajiv Munjal, Krishan Kumar, “Wireless Sensor Networks and Security Challenges”, IJCA, 2011.

Jaspreet Kaur, Tavleen Kaur, “A Comparative Study of Techniques Used in Detection and Prevention of Black Hole Attack in Wireless Sensor Networks”, IJRASET, vol.2, March- 2014.

SahabulAlam and Debashis De, “analysis of security threats in wireless sensor networks”, IJWMN, vol.6, April-2014.

Aashima single and ratikasachdeva, “Review on security issue and attacks in wireless sensor network, IJARCSSE, vol. 3, April-2013.

F. Stajano, R. Anderson, “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks”, 3rd AT&T Software Symposium, Middletown, NJ, October 1999.

C.Intanagonwiwat, R.Govindan and D.Estrin. Directed diffusion: A scalable and robust communication paradigm for sensor networks In Proc. of MobiCOM’00, Boston, Massachussetts, August 2000.

J. Hill, R. Szewczyk, A, Woo, S. Hollar, D. Culler, and K. Pister, System Architecture Directions for Networked Sensors, ASPLOS, November 2000.

Culler, D. E and Hong, W., “Wireless Sensor Networks”, Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33

M. Dener, “Security analysis in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 10, no. 10, 2014.

C. V. Samundre and P. A. D. Bijwe, “LEDS - an innovative corridor of data security in WSN,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 3, no. 2, pp. 707–711, 2015.

V. C. Giruka, M. Singhal, J. Royalty, and S. Varanasi, “Security in wireless sensor networks: Research article,” Wireless Communications and Mobile Computing, vol. 8, no. 1, pp. 1–24, 2008.

X. Du, and H-H. Chen, "Security in Wireless Sensor Networks", IEEE Wireless Communications, vol. 15, no. 4, Aug. 2008, pp.60-66.

H. Luo, Y. Lin and S. K. Das, "Routing Correlated Data in Wireless Sensor Networks: A Survey", IEEE Network, vol. 21, no.6, Nov/Dec. 2007, pp. 40-47.

R. Ramen, J. Lopez, S. Gritzalis, "Situation awareness mechanisms for wireless sensor networks ", IEEE Communication Magazine, vol. 46, no. 4, pp. 102-107, Apr. 2008.

S. Rajasegarar, C. Leckie, and M. Palansiwami, "Anomaly detection in wireless sensor networks", IEEE Wireless Communications, vol. 15, no. 4, Aug. 2008, pp. 34-40.

Yun Zhou, Yuguang Fang, Yanchao Zhang, Securing Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, year 2008

Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks, ” IEEE Commun. Surveys Tutorials, vol. 8, pp. 2– 23, year 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.